Privacy laws around the world are undergoing changes to reflect the concern around protecting PII, including the Australian Privacy Act 1988 (Privacy Act), which is undergoing an amendment to introduce Notifiable Data Breaches (NDB). The Office of the Australian Information Commissioner (OAIC) defines a NDB as being either:

a data breach that is likely to result in serious harm to any of the individuals to whom the information relates.

Data resides in both business and consumer apps together with cloud storage repositories, such as Dropbox, OneDrive and Google Drive. Therefore, the goal with mobile security is to secure that business data wherever it is. In the mobile world, the right security model means that employees can actually do more.

Why Mobile Security?

The use of mobile devices is key in to ensure the business is agile, effective and productive. However, there are many factors that should be considered when using mobile devices to ensure the business is protected from:

Today’s threat landscape is not getting any easier due to the sheer volume and diversity of devices, platforms and applications. Whilst there are a number of things that can be done to reduce the risk posture, quite often businesses don’t have the time or resources to effectively manage vulnerabilities.

Understanding your cyber exposure can transform the way in which your business handles information security. As cyber threats are evolving constantly, it’s important for businesses to evaluate threats on an ongoing basis to determine if the risk is acceptable or if it requires action.

This is a program driven by people, process and technology giving real metrics around the security posture of your business. The importance of cyber risk to be quantified and measured alongside every other business risk can greatly improve every strategic business decision.

Popular Tags

Our Newsletter

All services offered by nubesec utilise a business risk based approach to ensure that information security is addressed in line with the business objectives and strategy. Our approach is tailored to each individual business ensuring that security is implemented in a balanced sustainable approach.